{"id":8352,"date":"2015-04-30T05:00:41","date_gmt":"2015-04-30T12:00:41","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8352"},"modified":"2015-04-29T12:14:17","modified_gmt":"2015-04-29T19:14:17","slug":"dont-panic-unit-42-podcast","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/dont-panic-unit-42-podcast\/","title":{"rendered":"Listen to the New Unit 42 Podcast: Don't Panic"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft wp-image-8960 size-medium lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-230x230.jpg\" alt=\"unit 42 podcast\" width=\"230\" height=\"230\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast-128x128.jpg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/unit-42-podcast.jpg 2048w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/>Get the big picture on all things cybersecurity with the new\u00a0\u201cDon't Panic\" podcast, featuring members of Unit 42, the Palo Alto Networks threat intelligence team.<\/p>\n<p>In each episode we will discuss important cybersecurity topics\u00a0with Unit 42 researchers and industry experts helping to shape the current the security landscape.<!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Episode 1<br \/>\n<\/strong><strong>Don\u2019t Panic: Cybersecurity Information Sharing<br \/>\nHost: Ryan Olson, Intelligence Director, Unit 42<br \/>\n<a href=\"http:\/\/apple.co\/1PYtirI\" rel=\"nofollow,noopener\"  target=\"_blank\">Download here<\/a>.<br \/>\n<\/strong><\/p>\n<p>In this episode Rick Howard, Palo Alto Networks CSO, joins Ryan to discuss Cybersecurity Information Sharing and how threat alliance consortiums are advancing today. He also touches on\u00a0cybersecurity\u2019s impact on culture and media, covering the movie \u201cThe Imitation Game,\u201d which you\u2019ll need to see if you haven\u2019t already. (Spoiler alert!)<\/p>\n<p><strong>Episode 2<br \/>\n<\/strong><strong>Don\u2019t Panic: Backdoored Cryptographic Systems<br \/>\n<\/strong><strong>Host: Ryan Olson, Intelligence Director, Unit 42<br \/>\n<\/strong><strong><a href=\"http:\/\/apple.co\/1PYtirI\" rel=\"nofollow,noopener\"  target=\"_blank\">Download here<\/a>.<\/strong><\/p>\n<p>In this episode, Rick and Ryan\u00a0discuss Backdoored Cryptographic Systems, and their impact on the overall security of the Internet. We also dive into how CSI: Cyber, and other crime shows, portray cyber attacks to the public.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Get the big picture on all things cybersecurity with the new\u00a0\u201cDon't Panic\" podcast, featuring members of Unit 42, the Palo Alto Networks threat intelligence team. In each episode we will discuss important &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,112],"tags":[1160,1159,1105,1046,1104],"coauthors":[709],"class_list":["post-8352","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-interview","tag-backdoored-cryptographic-systems","tag-csi-cyber","tag-dont-panic","tag-the-imitation-game","tag-unit-42-podcast"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8352"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8352\/revisions"}],"predecessor-version":[{"id":8964,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8352\/revisions\/8964"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8352"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}